Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Backnote


Aliases:


URLSnoop, PICTURE.EXE, MANAGER.EXE, Troj/Picture

Malware

W32

Summary

This is not a virus but a Windows-based trojan horse.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

There are two variants of the backdoor. They have been circulated in e-mail and newsgroups postings as attachment files called PICTURE.EXE and MANAGER.EXE, sized 353792 bytes and 348672 bytes. Both of them copy themselves to the Windows directory as a file called NOTE.EXE file name and register themselves to be executed every time Windows boots up.

After this, the trojan gathers information from the machine, including username and password, copies them to an encrypted DAT file and tries to e-mail that file to addresses abreb@hotmail.com and chinafax@263.net.

This trojan does not spread by itself. It can be removed simply by deleting the NOTE.EXE file and the original carrier file. It is recommended that you change your password if you believe to be affected by this trojan.

Backnote was widespread between Christmas and New Year 1998.





Technical Details: Mikko Hypponen, F-Secure



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.